Virtual Routing and Forwarding for Lightpaths Implementations at SARA

Size: px
Start display at page:

Download "Virtual Routing and Forwarding for Lightpaths Implementations at SARA"

Transcription

1 Virtual Routing and Forwarding for Lightpaths Implementations at SARA 10 May 2011 Sander Boele, Pieter de Boer, Igor Idziejczak, Bas Kreukniet, Ronald van der Pol, Freek Dijkstra SARA Computing and Networking Services Abstract In this paper we examine the options to implement strict IP routing policies, while maintaining flexibility to access services. A design based on static routes suffers from inflexibility. Multiple pieces of hardware are costly and take more administration than a single piece of hardware. With Virtual routing and forwarding (VRF) instances you can overcome these drawbacks: they provide strict use policies, flexibility in IP service assignment and scalability on a single router. We will describe two specific cases of VRF solutions as they are implemented at SARA. 1

2 Table of Contents Introduction... 3 Problem description... 5 Solution... 7 Implementations at SARA SARA Grid VRFs Vancis AMS- IX VRFs Acknowledgements Table of Figures Figure 1. External connections to and from SARA... 3 Figure 2. Example of a simple VRF router... 8 Figure 3. GRID router with a sample of the configured VRFs Figure 4. Full- routing without restrictions for the customer Figure 5. VRFs for AMS- IX services on the Vancis routers

3 Introduction The demand for high capacity network connections is continuously increasing. Today, there is a strong demand for (semi- ) private networking over high bandwidth connections. Often, Optical Private Networks (OPNs) are used. An OPN is a network that connects sites by way of permanent lightpaths. Companies often choose for an OPN for reasons of performance, capacity, cost, and occasionally privacy of their data. Lightpaths in an OPN typically carry dedicated data traffic, and should not carry regular Internet traffic. In the scientific community, OPNs are often used to connect computing facilities, data storage environments and visualisation facilities with other computing centres and research institutes. High bandwidth is needed because the equipment of some research institutes generates huge amounts of data that needs to be transported. Figure 1 depicts the 10 Gb/s network connections to the Dutch e- Science centre SARA as of late SARA provides the same services to different users. Figure 1. External connections to and from SARA. The astrophysics LOFAR project and the nuclear physics LHC project connect remote instruments to storage facilities at SARA. The DEISA, and CosmoGrid projects connect supercomputing centres. The CineGrid, OptiPlanet and HPDM projects connect visualisation facilities. For example, the storage facility is connected to the LOFAR connection, three LHC connections and the public internet. A design decision was to create a single storage facility to offer scalable services to all projects instead of creating individual storage facilities for each project. A consequence is that 3

4 all storage OPNs should access the same facility. An OPN is a layer 1 or layer 2 network. For reasons of scalability and security it is not possible to connect all OPNs to the same VLAN. It is a requirement of SARA to make a clear distinction between administrative domains. Moreover, some OPNs have policies that prohibit routing from and to other OPNs. To accommodate these policies, SARA decided on an architecture where all lightpaths are terminated on a router, and all services (storage, computing, and visualisation) are reachable from this router. The separation of the traffic is made at layer 3 as we will see in the next paragraphs. 4

5 Problem description Operators of Optical Private Networks (OPNs) demand a strict routing policy: only traffic sourced from or destined to a particular service (be it a cluster, supercomputer, storage facility or single user) is allowed to make use of that OPN. All other traffic must be routed through other paths (for example the public internet). This poses the problem of segregating the privileged traffic allowed to traverse the OPN from the unprivileged traffic that is not allowed to traverse the OPN. Until five years ago many organisations did not use OPNs but simply used the public internet to provide connectivity between their services. This solution did not address many threats and problems: a strict routing policy was by definition not possible because destination based routing is used. A more secure option for privileged traffic is to terminate each OPN on a dedicated router, and separate IP routing on a per- router basis. Each dedicated router is used to provide a network connection to one service at the service provider (e.g. SARA). Specific routing policies are maintained on a per- router basis for every service. In addition, the router may have a default gateway to the public internet or a campus network. This solution has the drawback that it does not scale. First you need a lot of routers. Although the layer 3 requirements for an OPN are typically very light (usually, only a few IP blocks need to be known in an OPN). Second, you will need to make a lot of physical connections from all these routers to the desired services. Therefore, buying many routers seems like a waste of money. Apart from that, it will also take a lot of administrative hustle. Segregating traffic from different OPNs is a challenge in itself. With traditional destination based routing there is no additional policy configured. The routing makes use of two principles: best path principles and the matching of the most specific destination prefix. Each routing protocol has a set of rules to determine the best path to the destination. This is never based on the source prefix of the traffic. Looking at OPN technology, we don t want the best routes to be learned to the destination, we want to keep all data from the connected services within that OPN. So, source addresses should be evaluated. If they are allowed they will be made available in the routing tables within a specific OPN. If they are disallowed, these addresses should simply not be known in the OPN. A well- known routing problem (particularly in the public internet) is the problem of more specific routes: when a router uses a dynamic routing protocol it often learns many routes to the same destination. A basic principle of routing is that more specific routes are preferred over less specific ones. Even if a path is longer or the preferences are higher, the route with the most specific prefix will be elected over a less specific one. Sometimes this must be avoided, for instance when the more specific prefix comes from an expensive upstream link. You want to minimize the traffic over this link to save money. Another problem with more specifics can be as follows: An OPN does not have the most specific routes to its remote service. Imagine a router learns a more specific route via the public internet than the one it has learned from its remote side via the OPN. The router will choose the public internet to transfer the data between the services. This is definitely what must be avoided! 5

6 A solution can be provided with Virtual Routing and Forwarding (VRF). In the next paragraphs we will explain this technology, reveal its advantages and show some specific examples at SARA 1. 1 Examples are provided in order to explain how routing between VRFs is structured and manipulated. The examples differ from the actual configurations at the moment of writing. 6

7 Solution VRF is a technology that allows a single physical router to be divided into multiple virtual routers sharing the physical resources. One of the main benefits of VRFs is the ability to create multiple routing policies not only based on the destination of the traffic, but also on the source of the traffic. The key to the VRF technology is that each VRF instance has its own routing table. Between VRFs import and export policies allow routes to be transferred from one routing table to another. With these policies, routes can also be modified during this transfer, e.g. prepending a community or adjusting a metric. When only a small number of routes is exported, we speak of route- leaking. That means all routes are blocked except a few, which are explicitly selected to provide routing between specific sources and destinations. Using VRFs allows you to have multiple routing tables at the same time on one physical router. The routing instances are independent. Each protocol you want to run in a VRF needs to be configured locally. Enabling a protocol in a VRF will create a new process for that protocol and only for that VRF. So, for BGP, there will be neighbor and BGP databases per VRF. For OSPF, there will be topology and tree databases per VRF. In addition, a VRF has its own forwarding table that designates the next- hop for each data packet. These tables prevent traffic from being forwarded outside a specific VRF path and also keep out traffic that should remain outside that VRF. Due to this strict separation of routing, you could even use overlapping IP addresses with other VRFs. Virtual routing requires minimal changes to the existing network infrastructure and is a cheap and easy solution. Moreover, administration is simple, compared to using multiple physical routers. Figure 2 illustrates the basic principles of VRF technology by means of a simple VRF setup. Imagine two OPNs that need access to a storage cluster, OPN- A needs full access to the storage cluster (in this example /22). OPN- B only needs access to a small subset of the storage systems (in this example /29). Second, the storage cluster needs access to both OPNs and to the public internet. The configuration for OPN- A will look like this 2 : routing-instances { OPN-A { instance-type vrf; interface ge-0/1/1 route-distinguisher 1126:111; vrf-export export-opn-a-routes-to-storage-cluster routing-options { static route /22 next-table storage-cluster By issuing the command set routing- instances OPN- A instance- type vrf, a VRF is created named OPN- A. We need to bring the interface of the OPN- A in the VRF. This is configured with the line: interface ge- 0/1/1. 2 The configuration examples are in JUNOS (the Juniper Networks operating system). 7

8 Figure 2. Example of a simple VRF router We export all the routes of this OPN to the storage- cluster VRF with an export policy, named export- OPN- A- routes- to- storage- cluster (specification of policies is not included here, for examples see the paragraph SARA Grid VRFs ) and we import them with an impirt policy in the storage- cluster VRF (see next paragraphs). To learn routes from the storage- cluster VRF in other VRFs, we decide for static route leaking instead of an export and import policy. Static route leaking is configured in the receiving OPN. So in this case, we configure this in OPN- A and OP- B. For OPN- A, a static route with the next- table option is written in OPN- A. Do not confuse this with a normal static route (normal static routes make use of the next- hop option). The purpose of this static is that we want to give the OPN- A selective access to the storage- cluster VRF. By this static, any queries for this route in the OPN- A VRF are directed to the storage- cluster VRF. The OPN will not find any other routes that are in the storage- cluster VRF. Now, imagine, we would like to give OPN- B selective access to only a small block of addresses within the storage cluster. routing-instances { OPN-B { instance-type vrf; interface ge-0/1/2; route-distinguisher 1126:222; vrf-export export-opn-b-routes-to-storagecluster; routing-options { static route /29 next-table storage-cluster ; 8

9 This is easily achieved by configuring another instance of static route leaking: in the VRF for OPN- B we write: static route /29 next-table storage- cluster. Note that OPN- A and OPN- B have overlapping routing information. This does not create any problem with well- configured VRFs. The VRF for the storage cluster will look like this: edit routing-instances { storage-cluster { instance-type vrf; interface xe-2/2/0 route-distinguisher 1126:999; vrf-import import-opn-a-and-opn-b routing-options { static route /22 next-hop static route /0 next-table inet.0 Note, earlier, we set an export policy in OPN A and OPN B VRF. The export policies do not inject routes directly into an other VRF, it only makes them available to be imported by an import policy. The export policy adds attributes to the exported routes, while the import policy takes a copy of them when match criteria are met. We enable a policy to import all routes from OPN- A VRF and OPN- B VRF (called import- opn- a- and- opn- b ) in the storage- cluster VRF: policy-statement export-opn-a-routes-to-storage-cluster { then { community add opn; accept; policy-statement export-opn-b-routes-to-storage-cluster { then { community add opn; accept; policy-statement import-opn-a-and-opn-b { from community opn; then accept; We set a route to the storage cluster: static route /22 next-hop For the sake of simplicity we use a static route in the example, but any IP routing protocol can be used here. Finally we set a static default route to the global routing table (inet.0): static route /0 next-table inet.0. We prefer a default route to inet.0 rather than an import policy from the inet.0 since the latter will cause the huge amount of routes from the global table to be imported in the storage- cluster VRF. This route is not exported to the OPN VRFs since we only leak storage- cluster IP blocks. By setting the default to the global routing table, the storage- cluster VRF has routes to all sites. 9

10 The global configuration, on its turn, must have a static route for the storage cluster to provide routing from the public internet to the storage systems. This static is the same as the one we saw in OPN- A: static route /22 next-table storage-cluster This static route is configured globally since the global routing table is not a VRF. The uplink to the public internet is protected with an access- list. This restricts unlimited access to the storage systems from the outside. Note that this is not a special requirement of the VRF set- up: you would have needed this access- list anyway. For the VRFs no additional security is necessary to protect it from the outside. IP information is imported and exported and these routes can be modified as well. To ensure limited access to a few sources, we only leak routes. No changes are needed elsewhere in the local network. Packets are routed between the VRFs on the router, while the VRFs forward packets themselves. Hosts in the local (storage cluster) network can access the global routing table for external connectivity and can acquire selective access to specific OPNs. In the next paragraphs, we go on to explain two more VRF examples. These are VRF solutions at SARA and VANCIS. They reveal elaborate ways of route leaking. The first example uses static route leaking, while the second uses dynamic route leaking. 10

11 Implementations at SARA SARA Grid VRFs SARA makes a clear distinction between their storage and computing services. The SARA grid storage cluster is used for data storage by several external grid compute clusters in the national and international scientific community. The challenge is that the different connected external compute clusters share a general IP- destination, the storage cluster, while at the same time compute clusters should not see each other. It is necessary that the storage cluster is accessible from the outside, either via the public internet, or via OPNs. Since the total number of customers is low, we decided to use only one router for the connections to SARA s grid storage services. We chose a Juniper MX960. The choice for a single router challenged us to do virtual routing in an elegant and secure way. The SARA grid storage cluster is used in the Large Hadron Collider (LHC) project at CERN in Switzerland and France. For data transmission between CERN and the SARA grid storage cluster, the Large Hadron Collider Optical Private Network (LHCOPN) is used. The LHCOPN is a dedicated private network of multiple lightpaths connecting international networks 3 with each other. The lightpaths of the LHCOPN are connected to the grid router in a LHCOPN VRF. E- BGP sessions with LHCOPN peers are used to advertise and receive prefixes. This implies that the LHCOPN VRF learns the routes of the LHCOPN network. The next step is that they are exported to a VRF called storagecluster- shared. This VRF should have routes to all sites including the public internet. There is a local VRF for network monitoring. This one is called LHCOPN- monitoring in Figure 3. This network should connect from and to the LHCOPN and should also have access to the public internet. The SARA grid storage cluster is used by other compute clusters in the Netherlands as well, for example LOFAR and Life Science Grid (LSG). Traffic to and from these clusters also uses dedicated light paths. They are not allowed to have access to the LHCOPN but they need access to the grid storage cluster. For an even more enhanced security than a standard VRF solution provides (like Figure 2), we decided to configure different paths between VRFs for each direction of traffic. Traffic flows are displayed in Figure 3. 3 For a complete view of the LHCOPN, see: 11

12 Figure 3. GRID router with a sample of the configured VRFs We made a separate VRF for LHCOPN- monitoring and for the storage cluster. These VRFs have no connected interfaces but are only used for route look- ups. The routes that need to be known here are learned as follows: first an export policy is made for the relevant VRFs. For example: 12

13 edit policy-options { policy-statement lofar-export { then { community add lofar; accept; and we formulate a community with a unique value: community lofar members target:1126:3; Next, we configure the export policy in the corresponding VRF: edit routing-instances { LOFAR { instance-type vrf; interface xe-1/3/0.0; route-distinguisher 1126:3; vrf-export lofar-export; This will export all the routes from the LOFAR routing table. An import policy is required to match the above export policy. The import policy that gets the routes in another VRF is configured like this: policy-statement lofar-import { from community lofar; then accept; And we place this policy VRF- import in the storage cluster- shared VRF: routing-instances { storagecluster-shared { instance-type vrf; route-distinguisher 1126:999; vrf-import [ storagecluster-import lofar-import ]; The storagecluster- shared VRF is also configured to import LHCOPN routes (not included in example). This VRF learns all routes from the LSG, LOFAR and LHCOPN VRFs. The only criterion for importing routes is the community that is prepended to the routes coming from a VRF. However, from the side of these externally connected VRFs static route leaking is used to find the way to the storage cluster. These VRFs have static routes that selectively tell that the route to the storage cluster is found via the global routing table. The configuration is as follows: routing-instances { LOFAR { instance-type vrf; routing-options { 13

14 rib LOFAR.inet.0 { static { route /22 next-table inet.0; Instead of a next- hop option, we use a next- table option in order to direct to another routing table. In this case this is the global (internet) routing table. In the global routing table, a second route lookup is performed in order to find the interface to route the packets out. ). A route to the storage cluster in the global routing table is injected by means of a simple static at the global level of the configuration: edit routing-options { static { route /22 next-hop ; In order to provide routing from the storage cluster to the VRFs we configured a way to access the storagecluster- shared directly for route lookups. The interface from the storage cluster is connected to the VRF router at the global level. The interface has an inbound filter, configured as follows: filter storage-lan-in { term use-storagecluster-shared { then { routing-instance storagecluster-shared; Since no from statement is set, this means that any traffic will be redirected to the storagecluster- shared VRF. When traffic arrives at the interface, it will be passed to the storagecluster- shared VRF immediately. Nothing will be done at the global level of the router. In the storagecluster- shared VRF a route lookup is performed and traffic will be directed to the correct interface out in the corresponding VRF. Because the storage cluster should be able to access the public internet, there is also a default route in the storagecluster- shared VRF that points back to the global routing table. Again, a static route with the next- table option is used: routing-instances { storagecluster-shared { instance-type vrf; (..) routing-options { static { route /0 next-table inet.0; 14

15 Vancis AMS-IX VRFs Vancis, a subsidiary company of SARA, sells internet connectivity to customers. To do so, Vancis has links to upstream providers and VANCIS maintains a connection to the Amsterdam Internet Exchange (AMS- IX). A special service that Vancis offers to some of its customers is the AMS- IX only variant. In this variant a customer buys only connectivity to AMS- IX peers connected to VANCIS. The upstream providers typically provide full routing. All internet routes known to them are advertised to their peers. The AMS- IX allows peers to exchange their own routes only. For that reason an export filter must be set on the peer (or peer group) with the AMS- IX. All routes learned from the upstream or from anywhere else outside the network of the ISP and its (directly) connected customers, must be filtered out. At the links to upstream providers, we encounter a similar situation: the upstream providers do not want to receive the routes an ISP learns over the AMS- IX. Here, an export filter is set at the peer level as well. Usually, both measures are realized by prepending a community on the receipt of a route., The tagged routes are rejected for advertisement by filtering on this community- tag. Figure 4 denotes these filters with a ( symbol. The example in Figure 4 shows a setup where a customer is serviced with unrestricted internet access including the routes learned from the upstream providers and the routes learned over the AMS- IX peers. As long as there are no filters towards the customer they will receive all routes. Similarly, VANCIS advertises the routes received from the customer over the AMS- IX peers and over the upstream peers. This is not yet the desired situation for a customer paying for AMS- IX only service. Figure 4. Full- routing without restrictions for the customer. The challenge in this example is that routes received over the AMS- IX are not necessarily the best and most specific while the customer must use the AMS- IX anyway. In our ISP environment we have seen that approximately 10,000 prefixes received via our direct connection with our upstream providers are more specific than those received over the AMS- IX peerings. Since traffic over the 15

16 uplinks is much more costly than over the AMS- IX peerings, some customers choose for a cheaper solution: only use the AMS- IX peers. Could this be established without VRFs while we keep this architecture?? Let s consider tagging all routes learned over the upstream peers with a community. At Router 3 we place an export filter towards the customer router in order to filter these routes. Routes learned over the AMS- IX peers are not tagged with a community. Routes learned via the upstream are tagged with a community say 1126:101. Now, imagine, we receive route /24 from one of the AMS- IX peers and route /25 from the upstream provider. In the routing table of the VANCIS router (Router 3), these routes coexist in the same table. This must be this way since VANCIS and some other customers always want the best path 4 ; therefore the routes must be made available at the VANCIS systems. Before advertising routes to the AMS- IX transit customer, we filter all routes with the community 1126:101. The /24 learned over the AMS- IX is the only one sent to the customer router, and this route is inserted in their routing table. Imagine, the customer wants to reach His routing table will only have the /24. The route will be a BGP learned route and point to its EBGP peer. That is Router 3 in Figure 5. When the IP packet arrives here, a new route lookup will be performed and this time, the better route, the /25, is found. Since we do not filter anymore on communities from here on, the customer packet will also take the path via the upstream despite this destination prefix was not known to him, initially. This will no work with BGP filters only and without VRFs. We decided to segregate routing by means of VRFs. Since the routes in the public internet are constantly changing, the new setup must be able to continuously adapt to new changes. We found that the creation of two VRFs is sufficient to address the problem. On Router 3, we created a VRF called AMS- IX and a VRF called all- routes, see figure 6. 4 The drawing does not list all connections to the VANCIS router. In reality there are more links to the routers, than shown here. 16

17 Figure 5. VRFs for AMS- IX services on the Vancis routers. VRFs are created on Router 3, called AMS- IX and all- routes. Arrows indicate exchange of routes by way of export and import policies between the routing instances 5. The connection from the customer with AMS- IX- only is moved into the AMS- IX VRF including the BGP peering. All AMS- IX connections including the peering configurations are moved into the AMS- IX VRF. All the routes we learn from AMS- IX peers are tagged with a community 1126:102. All routes from the customer with the AMS- IX- only service are tagged with a community 1126:103. An export and an import policy is created in order to bring those routes from the AMS- IX VRF into the all- routes VRF. All routes from the AMS- IX VRF are exported into the global routing table; there are no restrictions from the AMS- IX VRF to the all- routes VRF. This ensures that the routes are present and can be advertised within the rest of the VANCIS network and VANCIS Customer networks. The prefixes from the Customer AMS- IX only are filtered out with an export policy at the peers to the upstream providers at Router 1 and Router 2. This export policy is configured as follows: policy-statement export-all-except-ams-ix-and-ams-ix-only-customer { term no-advertise-routes-from-upstream { from { community [ams-ix ams-ix-only-customer] then { reject; term anything-else { then { accept; 5 Note that the global routing table has no connected interfaces. Since all routing is done with the VRFs, this table is empty and does not have any function in routing anymore. 17

18 policy-options { community ams-ix members 1126:102 policy-options { community ams-ix-only-customer members 1126:103 The AMS- IX community (1126:102) was already configured to be rejected. With the creation of the AMS- IX VRF, only the customer community (1126:103) was added. Now, let s examine which routes we like to have in the AMS- IX VRF. The routes from the upstream should not be known here. How do we import routes from the all- routes VRF into the AMS- IX VRF, except the ones learned from the upstream peers? The routes from the upstream peers are already tagged with a community (1126:101). First we set an export policy in the all routes VRF that exports all routes. This is a simple policy that looks like this: policy-statement export-all-routes { term export-all { then { accept; Since no from statement is set, all routes will be elected for export. The trick is done at the import filter in the AMS- IX VRF. The upstream routes are easily filtered out with this policy: policy-statement import-all-except-upstreamroutes { term no-advertise-routes-from-upstream { from { community upstream then { reject; term anything-else { then { accept; policy-options { community upstream members 1126:101 When this import policy is set in the AMS- IX VRF, the original filter at the peer level to the AMS- IX (see Figure 4), is no more necessary and can be deleted. With those steps we build the bridge between the all- routes VRF and the AMS- IX VRF in such a way that the table in the all- routes VRF holds all the routes from the AMS- IX- only customer. The AMS- IX VRF, instead, does not contain the EBGP learned routes from the upstream. Thus we have eliminated the problem of more specific prefixes (the route /25 in the example above will not be available in the routing table of the AMS- IX VRF). 18

19 Note that the route filtering works in real- time. Since the communities are prepended at the receipt of BGP learned routes, the policies take any newly learned route into account, while arriving over the same link. Thus, this provides a method for dynamic route leaking. 19

20 Acknowledgements This work was funded in part by the GÉANT3 project. The authors like to thank Peter Tavenier and Ingrid Janssen for proofreading this document, and Hanno Pet for contributing to an early draft of this document. 20

Network Configuration Example

Network Configuration Example Network Configuration Example Virtual Router Use Case for Educational Networks Release NCE0039 Modified: 2017-01-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000

More information

Introduction to IP Routing. Geoff Huston

Introduction to IP Routing. Geoff Huston Introduction to IP Routing Geoff Huston Routing How do packets get from A to B in the Internet? A Internet B Connectionless Forwarding Each router (switch) makes a LOCAL decision to forward the packet

More information

Ronald van der Pol

Ronald van der Pol Ronald van der Pol Contributors! " Ronald van der Pol! " Freek Dijkstra! " Pieter de Boer! " Igor Idziejczak! " Mark Meijerink! " Hanno Pet! " Peter Tavenier Outline! " Network bandwidth

More information

Example: Conditionally Generating Static Routes

Example: Conditionally Generating Static Routes 1 of 5 9/30/2012 5:46 PM Example: Conditionally Generating Static Routes Understanding Conditionally Generated Routes Example: Configuring a Conditional Default Route Policy Understanding Conditionally

More information

ibgp Multipath Load Sharing

ibgp Multipath Load Sharing This feature module describes the feature. This feature enables the BGP speaking router to select multiple ibgp paths as the best paths to a destination. The best paths or multipaths are then installed

More information

Routing Basics. Campus Network Design & Operations Workshop

Routing Basics. Campus Network Design & Operations Workshop Routing Basics Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Multihoming Complex Cases & Caveats

Multihoming Complex Cases & Caveats Multihoming Complex Cases & Caveats ISP Workshops Last updated 6 October 2011 Complex Cases & Caveats p Complex Cases n Multiple Transits n Multi-exit backbone n Disconnected Backbone n IDC Multihoming

More information

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols Routing Basics 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 Addresses are 32 bits long Range from 1.0.0.0 to 223.255.255.255 0.0.0.0

More information

Site-1. Site-2. L3VPN Route-target and route-distinguisher Part I:

Site-1. Site-2. L3VPN Route-target and route-distinguisher Part I: L3VPN Route-target and route-distinguisher Part I: When configuring an L3VPN, you need to include both a route-distinguisher and a route-target. Due to the similar format of these two values, it is hard

More information

Routing Basics. ISP Workshops. Last updated 10 th December 2015

Routing Basics. ISP Workshops. Last updated 10 th December 2015 Routing Basics ISP Workshops Last updated 10 th December 2015 1 Routing Concepts p IPv4 & IPv6 p Routing p Forwarding p Some definitions p Policy options p Routing Protocols 2 IPv4 p Internet still uses

More information

Routing Overview for Firepower Threat Defense

Routing Overview for Firepower Threat Defense Path Determination This chapter describes underlying concepts of how routing behaves within the Cisco Firepower Threat Defense, and the routing protocols that are supported. Routing is the act of moving

More information

Routing Basics. ISP Workshops

Routing Basics. ISP Workshops Routing Basics ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated 26

More information

Service Provider Multihoming

Service Provider Multihoming BGP Traffic Engineering Previous examples dealt with loadsharing inbound traffic Of primary concern at Internet edge What about outbound traffic? Transit ISPs strive to balance traffic flows in both directions

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department of Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and

More information

BGP Case Studies. ISP Workshops

BGP Case Studies. ISP Workshops BGP Case Studies ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated

More information

BGP Routing and BGP Policy. BGP Routing. Agenda. BGP Routing Information Base. L47 - BGP Routing. L47 - BGP Routing

BGP Routing and BGP Policy. BGP Routing. Agenda. BGP Routing Information Base. L47 - BGP Routing. L47 - BGP Routing BGP Routing and BGP Policy BGP Routing The BGP Routing Principles and Route Decisions based on AS-Path in a simple topology of AS s routing policy is reduced to a minimal function demonstrated in example

More information

Service Provider Multihoming

Service Provider Multihoming Service Provider Multihoming ISP Workshops Last updated 18 September 2013 1 Service Provider Multihoming p Previous examples dealt with loadsharing inbound traffic n Of primary concern at Internet edge

More information

Inter-Autonomous-System Routing: Border Gateway Protocol

Inter-Autonomous-System Routing: Border Gateway Protocol Inter-Autonomous-System Routing: Border Gateway Protocol Antonio Carzaniga Faculty of Informatics University of Lugano December 10, 2014 Outline Hierarchical routing BGP Routing 2005 2007 Antonio Carzaniga

More information

Advanced Multihoming. BGP Traffic Engineering

Advanced Multihoming. BGP Traffic Engineering Advanced Multihoming BGP Traffic Engineering 1 Service Provider Multihoming Previous examples dealt with loadsharing inbound traffic Of primary concern at Internet edge What about outbound traffic? Transit

More information

Internet Interconnection Structure

Internet Interconnection Structure Internet Interconnection Structure Basic Concepts (1) Internet Service Provider (ISP) Provider who connects an end user customer with the Internet in one or few geographic regions. National & Regional

More information

Routing Between Autonomous Systems (Example: BGP4) RFC 1771

Routing Between Autonomous Systems (Example: BGP4) RFC 1771 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-7B Routing Between Autonomous Systems (Example: BGP4) RFC 1771 52 53 BGP4 Overview Example of Operations BGP4 is a path

More information

LARGE SCALE IP ROUTING

LARGE SCALE IP ROUTING Building ISP Networks Xantaro Page 1 / 18 TABLE OF CONTENTS 1. LAB ACCESS 4 1.1 Accessing the Jumphost... 4 1.2 Access to your routers... 4 1.3 Local Network Topology... 5 1.4 Global Network Topology...

More information

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN MPLS VPN 5-ian-2010 What this lecture is about: IP

More information

Service Provider Multihoming

Service Provider Multihoming Service Provider Multihoming BGP Traffic Engineering 1 Service Provider Multihoming Previous examples dealt with loadsharing inbound traffic Of primary concern at Internet edge What about outbound traffic?

More information

MPLS L3VPN. The MPLS L3VPN model consists of three kinds of devices: PE CE Site 2. Figure 1 Network diagram for MPLS L3VPN model

MPLS L3VPN. The MPLS L3VPN model consists of three kinds of devices: PE CE Site 2. Figure 1 Network diagram for MPLS L3VPN model is a kind of PE-based L3VPN technology for service provider VPN solutions. It uses BGP to advertise VPN routes and uses to forward VPN packets on service provider backbones. provides flexible networking

More information

Ronald van der Pol

Ronald van der Pol Ronald van der Pol Contributors! " Ronald van der Pol! " Freek Dijkstra! " Pieter de Boer! " Igor Idziejczak! " Mark Meijerink! " Hanno Pet! " Peter Tavenier (this work is partially funded

More information

Multihoming with BGP and NAT

Multihoming with BGP and NAT Eliminating ISP as a single point of failure www.noction.com Table of Contents Introduction 1. R-NAT Configuration 1.1 NAT Configuration 5. ISPs Routers Configuration 3 15 7 7 5.1 ISP-A Configuration 5.2

More information

Configuring MPLS L3VPN

Configuring MPLS L3VPN Contents Configuring MPLS L3VPN 1 MPLS L3VPN overview 1 Introduction to MPLS L3VPN 1 MPLS L3VPN concepts 2 MPLS L3VPN packet forwarding 5 MPLS L3VPN networking schemes 5 MPLS L3VPN routing information

More information

Inter-Autonomous-System Routing: Border Gateway Protocol

Inter-Autonomous-System Routing: Border Gateway Protocol Inter-Autonomous-System Routing: Border Gateway Protocol Antonio Carzaniga Faculty of Informatics University of Lugano June 14, 2005 Outline Hierarchical routing BGP Routing Routing Goal: each router u

More information

Service Provider Multihoming

Service Provider Multihoming Service Provider Multihoming ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last

More information

Network Working Group. Redback H. Smit. Procket Networks. October Domain-wide Prefix Distribution with Two-Level IS-IS

Network Working Group. Redback H. Smit. Procket Networks. October Domain-wide Prefix Distribution with Two-Level IS-IS Network Working Group Request for Comments: 2966 Category: Informational T. Li Procket Networks T. Przygienda Redback H. Smit Procket Networks October 2000 Status of this Memo Domain-wide Prefix Distribution

More information

BGP Protocol & Configuration. Scalable Infrastructure Workshop AfNOG2008

BGP Protocol & Configuration. Scalable Infrastructure Workshop AfNOG2008 BGP Protocol & Configuration Scalable Infrastructure Workshop AfNOG2008 Border Gateway Protocol (BGP4) Case Study 1, Exercise 1: Single upstream Part 6: BGP Protocol Basics Part 7: BGP Protocol - more

More information

Connecting to a Service Provider Using External BGP

Connecting to a Service Provider Using External BGP Connecting to a Service Provider Using External BGP First Published: May 2, 2005 Last Updated: August 21, 2007 This module describes configuration tasks that will enable your Border Gateway Protocol (BGP)

More information

Multi Topology Routing Truman Boyes

Multi Topology Routing Truman Boyes Multi Topology Routing Truman Boyes truman@juniper.net Copyright 2008 Juniper Networks, Inc. 1 Traffic Engineering Choices Today: IGP Metric Costing RSVP TE end to end Policy based routing EROs, Offline

More information

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011 Lecture 4: Intradomain Routing CS 598: Advanced Internetworking Matthew Caesar February 1, 011 1 Robert. How can routers find paths? Robert s local DNS server 10.1.8.7 A 10.1.0.0/16 10.1.0.1 Routing Table

More information

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role

More information

Exam Name: Service Provider, Professional (JNCIP-SP)

Exam Name: Service Provider, Professional (JNCIP-SP) Vendor: Juniper Exam Code: JN0-660 Exam Name: Service Provider, Professional (JNCIP-SP) Version: DEMO QUESTION 1 Click the Exhibit button. Customer A is complaining that CE1 and CE2 cannot form an OSPF

More information

Junos OS Multiple Instances for Label Distribution Protocol Feature Guide Release 11.4 Published: Copyright 2011, Juniper Networks, Inc.

Junos OS Multiple Instances for Label Distribution Protocol Feature Guide Release 11.4 Published: Copyright 2011, Juniper Networks, Inc. Junos OS Multiple Instances for Label Distribution Protocol Feature Guide Release 11.4 Published: 2011-11-08 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Configuring MPLS and EoMPLS

Configuring MPLS and EoMPLS 37 CHAPTER This chapter describes how to configure multiprotocol label switching (MPLS) and Ethernet over MPLS (EoMPLS) on the Catalyst 3750 Metro switch. MPLS is a packet-switching technology that integrates

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring the BGP Local Autonomous System Attribute Release NCE0045 Modified: 2016-11-08 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000

More information

Lab 1: Static MPLS LSP-RTX4-RTX1 LSP-RTX1-RTX4 LSP-RTX3-RTX2 LSP-RTX2-RTX3

Lab 1: Static MPLS LSP-RTX4-RTX1 LSP-RTX1-RTX4 LSP-RTX3-RTX2 LSP-RTX2-RTX3 Lab 1: Static MPLS First lab gives a basic understanding of MPLS label swapping No signaling manually assign labels like static routing Understand configuration, forwarding tables, and debugging of MPLS

More information

ACI Transit Routing, Route Peering, and EIGRP Support

ACI Transit Routing, Route Peering, and EIGRP Support ACI Transit Routing, Route Peering, and EIGRP Support ACI Transit Routing This chapter contains the following sections: ACI Transit Routing, on page 1 Transit Routing Use Cases, on page 1 ACI Fabric Route

More information

Vendor: Alcatel-Lucent. Exam Code: 4A Exam Name: Alcatel-Lucent Border Gateway Protocol. Version: Demo

Vendor: Alcatel-Lucent. Exam Code: 4A Exam Name: Alcatel-Lucent Border Gateway Protocol. Version: Demo Vendor: Alcatel-Lucent Exam Code: 4A0-102 Exam Name: Alcatel-Lucent Border Gateway Protocol Version: Demo QUESTION 1 Upon the successful establishment of a TCP session between peers, what type of BGP message

More information

Data Gathering in Optical Networks with the TL1 Toolkit

Data Gathering in Optical Networks with the TL1 Toolkit Data Gathering in Optical Networks with the TL1 Toolkit Ronald van der Pol 1 and Andree Toonk 2 1 SARA Computing & Networking Services, Kruislaan 415, 1098 SJ Amsterdam, The Netherlands rvdp@sara.nl http://nrg.sara.nl/

More information

BGP Configuration for a Transit ISP

BGP Configuration for a Transit ISP BGP Configuration for a Transit ISP ISP Workshops Last updated 24 April 2013 1 Definitions p Transit carrying traffic across a network, usually for a fee n traffic and prefixes originating from one AS

More information

IBGP scaling: Route reflectors and confederations

IBGP scaling: Route reflectors and confederations DD2491 p2 2009/2010 IBGP scaling: Route reflectors and confederations Olof Hagsand KTH /CSC 1 Literature Route Reflectors Practical BGP pages 135 153 RFC 4456 Confederations Practical BGP pages 153 160

More information

MPLS VPN. 5 ian 2010

MPLS VPN. 5 ian 2010 MPLS VPN 5 ian 2010 What this lecture is about: IP CEF MPLS architecture What is MPLS? MPLS labels Packet forwarding in MPLS MPLS VPNs 3 IP CEF & MPLS Overview How does a router forward packets? Process

More information

CSE 473 Introduction to Computer Networks. Final Exam. Your Name: 12/17/2014 PLEASE WRITE LEGIBLY NO POINTS FOR ILLEGIBLE ANSWERS

CSE 473 Introduction to Computer Networks. Final Exam. Your Name: 12/17/2014 PLEASE WRITE LEGIBLY NO POINTS FOR ILLEGIBLE ANSWERS CSE 47 Introduction to Computer Networks Roch Guérin Final Exam Your Name: 12/17/2014 PLEASE WRITE LEGIBLY NO POINTS FOR ILLEGIBLE ANSWERS 1. [10 points] Bob has been provided with the following pair of

More information

Examination. ANSWERS IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491

Examination. ANSWERS IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491 Examination ANSWERS IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491 Date: October 21st 2008 10:00 13:00 a) No help material is allowed

More information

BGP Attributes and Policy Control

BGP Attributes and Policy Control BGP Attributes and Policy Control ISP/IXP `2005, Cisco Systems, Inc. All rights reserved. 1 Agenda BGP Attributes BGP Path Selection Applying Policy 2 BGP Attributes The tools available for the job `2005,

More information

Configuring MPLS L3VPN

Configuring MPLS L3VPN Contents Configuring MPLS L3VPN 1 MPLS L3VPN overview 1 MPLS L3VPN concepts 2 MPLS L3VPN packet forwarding 4 MPLS L3VPN networking schemes 5 MPLS L3VPN routing information advertisement 8 Inter-AS VPN

More information

Lightpath support in LANs. Ronald van der Pol

Lightpath support in LANs. Ronald van der Pol Lightpath support in LANs Ronald van der Pol rvdp@sara.nl overview hybrid networks lightpaths inter domain lightpath setup lightpath support at the edges hybrid networks support for packet switched (routed

More information

L3VPN Configuration. L3VPN Overview. Introduction to L3VPN

L3VPN Configuration. L3VPN Overview. Introduction to L3VPN Table of Contents L3VPN Configuration 1 L3VPN Overview 1 Introduction to L3VPN 1 L3VPN Concepts 2 L3VPN Networking Schemes 3 OSPF VPN Extension 6 L3VPN Configuration Task List 8 Configuring VPN Instances

More information

Configuring a BGP Route Server

Configuring a BGP Route Server BGP route server is a feature designed for internet exchange (IX) operators that provides an alternative to full ebgp mesh peering among the service providers who have a presence at the IX. The route server

More information

Operation Manual MCE H3C S3610&S5510 Series Ethernet Switches. Table of Contents

Operation Manual MCE H3C S3610&S5510 Series Ethernet Switches. Table of Contents Table of Contents Table of Contents Chapter 1 MCE Overview... 1-1 1.1 MCE Overview... 1-1 1.1.1 Introduction to BGP/MPLS VPN... 1-1 1.1.2 BGP/MPLS VPN Concepts... 1-2 1.1.3 Introduction to MCE... 1-5 1.1.4

More information

Course 6. Internetworking Routing 1/33

Course 6. Internetworking Routing 1/33 Course 6 Internetworking Routing 1/33 Routing The main function of the network layer is routing packets from the source machine to the destination machine. Along the way, at least one intermediate node

More information

BGP mvpn BGP safi IPv4

BGP mvpn BGP safi IPv4 The BGP mvpn BGP safi 129 IPv4 feature provides the capability to support multicast routing in the service provider s core IPv4 network This feature is needed to support BGP-based MVPNs BGP MVPN provides

More information

Module 16 An Internet Exchange Point

Module 16 An Internet Exchange Point ISP Workshop Lab Module 16 An Internet Exchange Point Objective: To investigate methods for connecting to an Internet Exchange Point. Prerequisites: Modules 12 and 13, and the Exchange Points Presentation

More information

MPLS VPN Route Target Rewrite

MPLS VPN Route Target Rewrite The feature allows the replacement of route targets on incoming and outgoing Border Gateway Protocol (BGP) updates Typically, Autonomous System Border Routers (ASBRs) perform the replacement of route targets

More information

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Inter-AS routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Chapter 4:

More information

MPLS VPN--Inter-AS Option AB

MPLS VPN--Inter-AS Option AB The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) service provider

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Dual-Stack Lite for IPv6 Access Release NCE0025 Modified: 2016-10-12 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 12: Inter-domain routing Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

JN0-343 Q&As. Juniper Networks Certified Internet Specialist (JNCIS-ENT) Pass Juniper JN0-343 Exam with 100% Guarantee

JN0-343 Q&As. Juniper Networks Certified Internet Specialist (JNCIS-ENT) Pass Juniper JN0-343 Exam with 100% Guarantee JN0-343 Q&As Juniper Networks Certified Internet Specialist (JNCIS-ENT) Pass Juniper JN0-343 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : JN0-643 Title : Enterprise Routing and Switching, Professional (JNCIP- ENT) Vendor : Juniper Version : DEMO Get Latest

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology internet technologies and standards Piotr Gajowniczek BGP (Border Gateway Protocol) structure of the Internet Tier 1 ISP Tier 1 ISP Google

More information

COMP/ELEC 429 Introduction to Computer Networks

COMP/ELEC 429 Introduction to Computer Networks COMP/ELEC 429 Introduction to Computer Networks Lecture 11: Inter-domain routing Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at

More information

Juniper JN Enterprise Routing and Switching Support Professional (JNCSP-ENT)

Juniper JN Enterprise Routing and Switching Support Professional (JNCSP-ENT) Juniper JN0-694 Enterprise Routing and Switching Support Professional (JNCSP-ENT) http://killexams.com/exam-detail/jn0-694 D. An OSPF adjacency is flapping. Answer: C, D QUESTION: 44 You use static routes

More information

Link State Routing & Inter-Domain Routing

Link State Routing & Inter-Domain Routing Link State Routing & Inter-Domain Routing CS640, 2015-02-26 Announcements Assignment #2 is due Tuesday Overview Link state routing Internet structure Border Gateway Protocol (BGP) Path vector routing Inter

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able

More information

CS 457 Networking and the Internet. The Global Internet (Then) The Global Internet (And Now) 10/4/16. Fall 2016

CS 457 Networking and the Internet. The Global Internet (Then) The Global Internet (And Now) 10/4/16. Fall 2016 CS 457 Networking and the Internet Fall 2016 The Global Internet (Then) The tree structure of the Internet in 1990 The Global Internet (And Now) A simple multi-provider Internet 1 The Global Internet Some

More information

BGP made easy. John van Oppen Spectrum Networks / AS11404

BGP made easy. John van Oppen Spectrum Networks / AS11404 1 BGP made easy John van Oppen Spectrum Networks / AS11404 2 What is BGP? Snarky answer: RFC-4271 BGP is an Exterior gateway protocol, the only one used on the public Internet and is used for inter-autonomous

More information

Introduction to External Connectivity

Introduction to External Connectivity Before you begin Ensure you know about Programmable Fabric. Conceptual information is covered in the Introduction to Cisco Programmable Fabric and Introducing Cisco Programmable Fabric (VXLAN/EVPN) chapters.

More information

OSPF Protocol Overview on page 187. OSPF Standards on page 188. OSPF Area Terminology on page 188. OSPF Routing Algorithm on page 190

OSPF Protocol Overview on page 187. OSPF Standards on page 188. OSPF Area Terminology on page 188. OSPF Routing Algorithm on page 190 Chapter 17 OSPF Protocol Overview The Open Shortest Path First (OSPF) protocol is an interior gateway protocol (IGP) that routes packets within a single autonomous system (AS). OSPF uses link-state information

More information

IPv6 Module 16 An IPv6 Internet Exchange Point

IPv6 Module 16 An IPv6 Internet Exchange Point IPv6 Module 16 An IPv6 Internet Exchange Point Objective: To investigate methods for connecting to an Internet Exchange Point. Prerequisites: Modules 12, 14 and 15, and the Exchange Points Presentation

More information

BGP Commands: M through N

BGP Commands: M through N match additional-paths advertise-set, on page 3 match as-path, on page 6 match community, on page 8 match extcommunity, on page 10 match local-preference, on page 12 match policy-list, on page 14 match

More information

Outline Computer Networking. Inter and Intra-Domain Routing. Internet s Area Hierarchy Routing hierarchy. Internet structure

Outline Computer Networking. Inter and Intra-Domain Routing. Internet s Area Hierarchy Routing hierarchy. Internet structure Outline 15-441 15-441 Computer Networking 15-641 Lecture 10: Inter-Domain outing Border Gateway Protocol -BGP Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 outing hierarchy Internet structure

More information

NaMeX Route Server HOWTO

NaMeX Route Server HOWTO NaMeX Route Server HOWTO June 24, 2010 1 Service overview Route servers (RS) are a value-added service that can be offered by IXPs. Actually, the availability of a RS within an IXP is becoming more and

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring BGP Autodiscovery for LDP VPLS Release NCE0035 Modified: 2017-01-24 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Troubleshooting High CPU Caused by the BGP Scanner or BGP Router Process

Troubleshooting High CPU Caused by the BGP Scanner or BGP Router Process Troubleshooting High CPU Caused by the BGP Scanner or BGP Router Process Document ID: 107615 Contents Introduction Before You Begin Conventions Prerequisites Components Used Understanding BGP Processes

More information

Monitoring BGP. Configuring the Router

Monitoring BGP. Configuring the Router You have to be extra careful if the prefix you want to announce over BGP is already present in the global routing table. This happens in the situation where your ISP announced your address block but you

More information

Internet Routing : Fundamentals of Computer Networks Bill Nace

Internet Routing : Fundamentals of Computer Networks Bill Nace Internet Routing 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Looking Ahead Lab #2 just due Quiz #2

More information

MPLS VPN Carrier Supporting Carrier Using LDP and an IGP

MPLS VPN Carrier Supporting Carrier Using LDP and an IGP MPLS VPN Carrier Supporting Carrier Using LDP and an IGP Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) Carrier Supporting Carrier (CSC) enables one MPLS VPN-based service provider

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 15 BGP. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 15 BGP. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 15 BGP Spring 2018 Rachit Agarwal Autonomous System (AS) or Domain Region of a network under a single administrative entity Border Routers Interior

More information

Introduction. Keith Barker, CCIE #6783. YouTube - Keith6783.

Introduction. Keith Barker, CCIE #6783. YouTube - Keith6783. Understanding, Implementing and troubleshooting BGP 01 Introduction http:// Instructor Introduction Keith Barker, CCIE #6783 CCIE Routing and Switching 2001 CCIE Security 2003 kbarker@ine.com YouTube -

More information

Lecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage

Lecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage Lecture 16: Interdomain Routing CSE 123: Computer Networks Stefan Savage Overview Autonomous Systems Each network on the Internet has its own goals Path-vector Routing Allows scalable, informed route selection

More information

BGP Attributes and Policy Control

BGP Attributes and Policy Control BGP Attributes and Policy Control ISP/IXP Workshops 1 Agenda BGP Attributes BGP Path Selection Applying Policy 2 BGP Attributes The tools available for the job 3 What Is an Attribute?... Next Hop......

More information

Internet Engineering Task Force (IETF) Request for Comments: 7024 Category: Standards Track

Internet Engineering Task Force (IETF) Request for Comments: 7024 Category: Standards Track Internet Engineering Task Force (IETF) Request for Comments: 7024 Category: Standards Track ISSN: 2070-1721 H. Jeng J. Uttaro AT&T L. Jalil Verizon B. Decraene Orange Y. Rekhter Juniper Networks R. Aggarwal

More information

Internet Routing Basics

Internet Routing Basics Internet Routing Basics Back to basics J Application Presentation Application (HTTP, DNS, FTP) Data Application (HTTP, DNS, FTP) Session Transport Transport (TCP/UDP) E2E connectivity (app-to-app) Port

More information

MPLS VPN Inter-AS Option AB

MPLS VPN Inter-AS Option AB First Published: December 17, 2007 Last Updated: September 21, 2011 The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol

More information

Route Leaking in MPLS/VPN Networks

Route Leaking in MPLS/VPN Networks Route Leaking in MPLS/VPN Networks Document ID: 47807 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Route Leaking from a Global Routing Table into a VRF and Route

More information

Cisco Performance Routing

Cisco Performance Routing Cisco Performance Routing As enterprise organizations grow their businesses, the demand for real-time application performance and a better application experience for users increases. For example, voice

More information

CS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella

CS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol) Intra-domain routing The Story So Far Routing protocols generate the forwarding

More information

BGP and the Internet

BGP and the Internet BGP and the Internet Transit and Internet Exchange Points 1 Definitions Transit carrying traffic across a network, usually for a fee traffic and prefixes originating from one AS are carried across an intermediate

More information

Ronald van der Pol

Ronald van der Pol Ronald van der Pol Outline! Goal of this project! 40G demonstration setup! Application description! Results! Conclusions Goal of the project! Optimize single server disk to network I/O!

More information

Internetworking: Global Internet and MPLS. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

Internetworking: Global Internet and MPLS. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 Internetworking: Global Internet and MPLS Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 10/19/2016 CSCI 445 Fall 2016 1 Acknowledgements Some pictures

More information

This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics:

This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics: Appendix C BGP Supplement This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics: BGP Route Summarization Redistribution with IGPs Communities Route

More information

Interdomain Routing Reading: Sections P&D 4.3.{3,4}

Interdomain Routing Reading: Sections P&D 4.3.{3,4} Interdomain Routing Reading: Sections P&D 4.3.{3,4} EE122: Intro to Communication Networks Fall 2006 (MW 4:00-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim http://inst.eecs.berkeley.edu/~ee122/

More information

How the Internet works? The Border Gateway Protocol (BGP)

How the Internet works? The Border Gateway Protocol (BGP) Chair of Network Architectures and Services - Prof. Carle Department of Computer Science Technical University of Munich How the Internet works? The Border Gateway Protocol (BGP) Edwin Cordeiro ilab2 Lecture

More information